• Nenhum resultado encontrado

[PDF] Top 20 Cloud Storage and its Secure Overlay Techniques

Has 10000 "Cloud Storage and its Secure Overlay Techniques " found on our website. Below are the top 20 most common "Cloud Storage and its Secure Overlay Techniques ".

Cloud Storage and its Secure Overlay Techniques

Cloud Storage and its Secure Overlay Techniques

... enough storage space to hold all the data they've acquired is a real ...external storage devices like thumb drives or compact ...local storage device, it is saved to a remote ...computer and ... See full document

5

Secure Deduplication for Cloud Storage Using Interactive Message-Locked Encryption with Convergent Encryption, To Reduce Storage Space

Secure Deduplication for Cloud Storage Using Interactive Message-Locked Encryption with Convergent Encryption, To Reduce Storage Space

... reduce storage and improve the bandwidth ...benefits storage providers, it also creates a privacy threat for ...client and server side deduplication system ...in cloud data ... See full document

13

Secure and efficient storage of multimedia: content in public cloud environments using joint compression and encryption

Secure and efficient storage of multimedia: content in public cloud environments using joint compression and encryption

... defense, and protects against most attempts by users to launch attacks against other ...virtualized and not all virtualization environments are ...the cloud user against the ...contracts and ... See full document

125

A survey on top security threats in cloud computing

A survey on top security threats in cloud computing

... as storage, network, applications and software through ...internet. Cloud users can lease multiple resources according to their requirements, and pay only for the services they ...all ... See full document

5

DESIGN AND IMPLEMENTATION OF A PRIVACY PRESERVED OFF-PREMISES CLOUD STORAGE

DESIGN AND IMPLEMENTATION OF A PRIVACY PRESERVED OFF-PREMISES CLOUD STORAGE

... security and privacy on cloud is breached by external or internal attackers (Ling et ...CSPs secure their physical and virtual infrastructure by using various tools and ... See full document

14

 Secure Erasure Code-Based Cloud Storage with Secured Data Forwarding Using Conditional Proxy Re-Encryption (C-PRE)

Secure Erasure Code-Based Cloud Storage with Secured Data Forwarding Using Conditional Proxy Re-Encryption (C-PRE)

... - Cloud computing techniques are used to share ...software and databases to the centralized large data ...with cloud storage providers comes with serious security ...The cloud ... See full document

5

Vertical Handover and Video Streaming Over Cloud in 4G Heterogeneous Overlay Wireless Networks

Vertical Handover and Video Streaming Over Cloud in 4G Heterogeneous Overlay Wireless Networks

... proxy and the BSs to estimate the delivery times of packets via each available ...presented, and its applicability was demonstrated through computer ...delays and reduces overhead in terms of ... See full document

11

Bernardo Luís da Silva Ferreira

Bernardo Luís da Silva Ferreira

... Hahn and Ker- schbaum 2014; Kamara and Papamanthou 2013; Kamara et ...document) and uploading both encrypted index and data to the cloud for ...data and rich media types such as ... See full document

203

Research on Distributed Software Testing Platform Based on Cloud Resource

Research on Distributed Software Testing Platform Based on Cloud Resource

... results and registration of job running client. Database server is for storage static and dynamic data of system which is the resource sharing ...manager and a test task state ... See full document

9

Privacy-Enhanced Dependable and Searchable Storage in a Cloud-of-Clouds

Privacy-Enhanced Dependable and Searchable Storage in a Cloud-of-Clouds

... the cloud and the several problems that arise from doing so is an area of active ...[30] and TSky [31] are proposals particularly related to the main dissertation ...availability and text ... See full document

112

Guaranteeing Data Storage Security in Cloud Computing

Guaranteeing Data Storage Security in Cloud Computing

... the cloud, he challenges the cloud servers with an arrangement of arbitrarily produced piece ...every cloud server registers a short "mark" over the predetermined squares and returns ... See full document

4

Enabling and Sharing Storage Space Under a Federated Cloud Environment

Enabling and Sharing Storage Space Under a Federated Cloud Environment

... paradigma cloud, em geral, e o de uma cloud OpenStack, que disponibiliza Infraestrura(s) como Serviço (IaaS), em par- ticular; b) investigar sistemas de armazenamento candidatos a serem integrados com os ... See full document

145

EOS: Evolutionary Overlay Service in Peer-to-Peer Systems

EOS: Evolutionary Overlay Service in Peer-to-Peer Systems

... Moreover, from the work of Paul Silvey et al. [12] and G. Pandurangan et al. [13] , etc., we can conclude that there are respectable researches on improving the system performance by adapting the P2P topologies. ... See full document

6

A Blockchain-Based Information Security Solution for a Distributed Multi-Cloud System

A Blockchain-Based Information Security Solution for a Distributed Multi-Cloud System

... people and businesses have nowadays and if businesses al- ready depend both on structured and unstructured data made available, relying on sophisticated Information Technology (IT) infrastructures, ... See full document

110

Caracterização de tráfego de rede : Cloud Storage na Universidade do Minho

Caracterização de tráfego de rede : Cloud Storage na Universidade do Minho

... os Cloud Storages, categoria essa que inclui todos as assinaturas/prestadores ...fluxos Cloud Storage, pois sendo a Universidade do Minho anfitriã de muitos estudantes estrangeiros, é possível que ... See full document

121

Secure authentication mechanisms for the management interface in cloud computing environments

Secure authentication mechanisms for the management interface in cloud computing environments

... of cloud computing has brought novel security issues speci c to the technology and to how it is deployed over the Internet, as Chapter 3 explained, along with the problems posed by authentication ... See full document

125

Cloud Auditing With Zero Knowledge Privacy

Cloud Auditing With Zero Knowledge Privacy

... correctness and integrity of the cloud ...the cloud, based on the user’s request. In this case, the Cloud service provider doesn’t have to worry about the correctness and integrity of ... See full document

6

Hand-based multimodal identification system with secure biometric template storage

Hand-based multimodal identification system with secure biometric template storage

... (PP) and finger surface (FS) matching, which are two well studied ...extraction techniques, such as 2-D Gabor filters [10,11,12,13,14], 2-D Gaussian filters [15], finite Radon transform [16] and ... See full document

33

PUBLIC LINEAR PROGRAMMING SOLUTION FOR  THE DESIGN OF SECURE AND EFFICIENT  COMPUTING IN CLOUD

PUBLIC LINEAR PROGRAMMING SOLUTION FOR THE DESIGN OF SECURE AND EFFICIENT COMPUTING IN CLOUD

... the cloud and beyond. However, ordinary data encryption techniques in essence prevent cloud from performing any meaningful operation of the underlying plaintext data, making the computation ... See full document

12

COMPARISON OF NORMAL SELFISH OVERLAY NETWORK AND SELFISH OVERLAY NETWORK WITH DEPLOYMENT OF OVERLAY NODES USING FUZZY LOGIC

COMPARISON OF NORMAL SELFISH OVERLAY NETWORK AND SELFISH OVERLAY NETWORK WITH DEPLOYMENT OF OVERLAY NODES USING FUZZY LOGIC

... Selfish overlay routing is the technique whereby the sender of the packet can specify the route that the packet should take through the ...Selfish overlay routing allow end users to select routes in an ... See full document

8

Show all 10000 documents...